QID 154141

Date Published: 2023-05-24

QID 154141: WordPress Directory Traversal Vulnerability (CVE-2023-2745)

WordPress is a free and open-source content management system written in PHP and paired with a MySQL or MariaDB database.

WordPress Core is vulnerable to Directory Traversal in the 'wp_lang' parameter. This vulnerability allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as through an upload form, it could also be used to perform a Cross-Site Scripting attack.

Affected Versions:
WordPress versions 6.2.1 and prior

QID Detection Logic:
This QID sends an HTTP GET request and checks for vulnerable version of WordPress running on the target application.

This vulnerability allows unauthenticated attackers to access and load arbitrary translation files.

  • CVSS V3 rated as High - 6.1 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution
    Customers are advised to upgrade to the latest version of WordPress to remediate these vulnerabilities. For more information regarding these vulnerabilities please visit WordPress Security Release.

    CVEs related to QID 154141

    Software Advisories
    Advisory ID Software Component Link
    WordPress 6.2.1 Maintenance & Security Release URL Logo wordpress.org/news/2023/05/wordpress-6-2-1-maintenance-security-release/